Common Vulnerabilities and Exposures assigned an identifier CVE-2011-0444 to the following vulnerability: Name: CVE-2011-0444 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0444 Assigned: 20110112 Reference: MISC: https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5676 Reference: CONFIRM: http://www.wireshark.org/security/wnpa-sec-2011-01.html Reference: CONFIRM: http://www.wireshark.org/security/wnpa-sec-2011-02.html Reference: CONFIRM: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5530 Reference: VUPEN:ADV-2011-0079 Reference: URL: http://www.vupen.com/english/advisories/2011/0079 Buffer overflow in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c) in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of RARs. Interestingly, the upstream bug refers to two patches: http://anonsvn.wireshark.org/viewvc?view=rev&revision=35298 fixes a buffer overflow in the engineId preferences (seems applicable to 1.0.x also), and http://anonsvn.wireshark.org/viewvc?view=rev&revision=35292 fixes the buffer overflow in the MAC LTE dissector (not applicable to 1.0.x; this file is not shipped).
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 669445]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0369 https://rhn.redhat.com/errata/RHSA-2011-0369.html